http://github.com/hashbang/darkwing
NOTE: The following is all in DRAFT status and part of documentation driven development
DARKWING a pentestesting platform embedded inside a USB Cable. It is intended as a more covert alternative to the fantastic USB Rubber Ducky platform by Hak5 with an enhanced range of attack capabilities.
We use a powerful STM32F4 platform on a thin flexible PCB that can easily fit inside a USB Type C connector housing and be soldered directly to the connector.
It is named DARKWING after the most stealthy of all ducks. We also make it ALL CAPS because it makes it look more like an NSA project.
- Run USB Rubber Ducky payloads
- Installing malware via keyboard emulation
- Sound exfiltration by emulating speakers
- Screenshot by emulating USB-Type-C HDMI device
- Mouse movement/click injection to prevent screen locking
- Hidden data storage via internal flash memory
- USB Device Authentication via custom kernel driver and device certificates.
- Password management via hidden keyboard shortcuts and key injection
- Device reverse engineering by logging USB packets from connected device
- Development
- Production
TBD
Use at your own risk. You may be eaten by a grue.